--- nufw-2.2.15.orig/debian/docs +++ nufw-2.2.15/debian/docs @@ -0,0 +1,3 @@ +NEWS +README +TODO --- nufw-2.2.15.orig/debian/control +++ nufw-2.2.15/debian/control @@ -0,0 +1,161 @@ +Source: nufw +Section: net +Priority: optional +XS-Python-Version: all +Maintainer: Pierre Chifflier +Build-Depends: debhelper (>= 4.1.16),po-debconf, automake1.9, + libldap2-dev, libglib2.0-dev, + libmysqlclient15-dev|libmysqlclient14-dev, + libpq-dev, + iptables-dev, + libtool, + libgnutls-dev|libgnutls11-dev, libsasl2-dev, + libpam0g-dev, + libprelude-dev, + libnetfilter-conntrack-dev, libnetfilter-queue-dev, libnfnetlink-dev, + python-support (>= 0.4), python-dev +Standards-Version: 3.7.3 + +Package: nufw +Architecture: any +Depends: ${shlibs:Depends}, debconf (>= 1.3.22), ssl-cert, openssl +Suggests: ulogd, ulogd-mysql +Description: a per-user firewalling daemon that interferes with libipq + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + Nufw is the daemon that receives some network packets through the NFQUEUE + netfilter rule. Informations about those packets are forwarded to the + nuauth daemon, which decides if packets should be accepted or denied, + sends back the information to Nufw that applies decisions. + . + To use this package, you must have a recent kernel (>= 2.6.18) + +Package: nuauth +Architecture: any +Pre-Depends: passwd, adduser +Depends: ${shlibs:Depends}, debconf (>= 1.3.22), ucf, libsasl2-modules, ssl-cert, openssl +Recommends: nuauth-utils +Description: The authentication daemon from the nufw package + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + Nuauth lays on a user database, and an ACL system (which can reside in an LDAP + directory, or XML/DBM solutions, etc. + Nuauth receives requests from nufw, and auth packets from users' clients, + and sends decision to the nufw daemon. + +Package: nuauth-extra +Architecture: any +Depends: ${shlibs:Depends}, debconf, nuauth +Recommends: nuauth-utils +Description: The authentication daemon from the nufw package + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + Nuauth lays on a user database, and an ACL system (which can reside in an LDAP + directory, or XML/DBM solutions, etc. + Nuauth receives requests from nufw, and auth packets from users' clients, + and sends decision to the nufw daemon. + . + Nuauth-extra provides extra modules for nuauth. + +Package: nuauth-log-mysql +Architecture: any +Depends: ${shlibs:Depends}, debconf, nuauth +Conflicts: nuauth-log-pgsql +Recommends: nuauth-utils +Description: Module for nuauth logging into MySQL databases + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + This package adds support for nuauth logging users activity into a MySQL + database. You can use this for an SSO solution, too. + +Package: nuauth-log-pgsql +Architecture: any +Depends: ${shlibs:Depends}, debconf, nuauth +Conflicts: nuauth-log-mysql +Recommends: nuauth-utils +Description: Module for nuauth logging into PostgreSQL databases + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + This package adds support for nuauth logging users activity into a PostgreSQL + database. You can use this for an SSO solution, too. + +Package: nutcpc +Architecture: any +Depends: ${shlibs:Depends}, libnuclient3 (= ${binary:Version}) +Description: a Linux client for the nufw authentication gateway system + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + nutcpc is the GNU/Linux client for the nufw authentication gateway. + when network traffic leaves the machine, nutcpc deals with it and sends + authenticating data to the nuauth server. + +Package: nuauth-utils +Architecture: all +Depends: ${shlibs:Depends}, ${python:Depends}, python-ipy, perl, libnet-ldap-perl, nuauth +XB-Python-Version: ${python:Versions} +Description: Set of tools useful to nuauth admin + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + nuaclgen is a perl script that helps generate LDAP ACLs for use with nuauth, + the nufw auth daemon. nuauth_command is a Python script to control the + nuauth daemon. + +Package: libnuclient3 +Architecture: any +Depends: ${shlibs:Depends}, libsasl2-modules +Replaces: libnuclient +Conflicts: libnuclient +Description: client library for nufw authentication + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + This library provides a convenient system to build NuFW authentication client. + +Package: libnuclient-dev +Architecture: any +Depends: ${shlibs:Depends}, libsasl2-dev, libgnutls-dev|libgnutls11-dev, libnuclient3 (= ${binary:Version}) +Section: libdevel +Description: Development files for nufw client library + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + This library provides files needed to develop a NuFW authentication client. + +Package: libpam-nufw +Architecture: any +Depends: ${shlibs:Depends}, libnuclient3 (= ${binary:Version}) +Description: Pluggable Authentication module for nufw authentication + NuFW is an authenticating gateway, which means that connections are + authenticated before being forwarded through the gateway. Classical packet + filtering systems disregard the identity of the user who may be attempting to + access the network, instead caring only about the originating IP addresses. + . + This module allows to open a client connection to the nufw authentication + gateway. When network traffic leaves the machine, it deals with it and sends + authenticating data to the nuauth server. + --- nufw-2.2.15.orig/debian/nutcpc.install +++ nufw-2.2.15/debian/nutcpc.install @@ -0,0 +1 @@ +src/clients/nutcpc/.libs/nutcpc usr/bin --- nufw-2.2.15.orig/debian/nuauth.postinst +++ nufw-2.2.15/debian/nuauth.postinst @@ -0,0 +1,125 @@ +#!/bin/sh +CONFIGFILE1=/etc/default/nuauth +CONFIGFILE2=/etc/nufw/nuauth.conf +set -e +. /usr/share/debconf/confmodule + +grepconf () { + w=" " # space tab + sq=/etc/nufw/nuauth.conf + # sed is cool. + res=`sed -ne ' + s/^\s*'$1'\s*=\s*"\?\([^"]*\)\"$/\1/p; + t end; + d; + :end q' < $sq` + [ -n "$res" ] || res=$2 + echo "$res" +} + +grepdefault () { + w=" " # space tab + sq=/etc/default/nuauth + # sed is cool. + res=`sed -ne ' + s/^\s*'$1'\s*=\s*"\?\([^"]*\)\"$/\1/p; + t end; + d; + :end q' < $sq` + [ -n "$res" ] || res=$2 + echo "$res" +} + +# Installing the config +ucf --three-way --debconf-ok /usr/share/nuauth/nuauth.conf /etc/nufw/nuauth.conf + +NUAUTH_USER=`grepdefault NUAUTH_USER nobody` +nuauth_tls_key=`grepconf nuauth_tls_key /etc/nufw/nuauth-key.pem` +nuauth_tls_cert=`grepconf nuauth_tls_cert /etc/nufw/nuauth-cert.pem` + +if grep -q -e "^$NUAUTH_USER:" /etc/passwd +then + chown $NUAUTH_USER /var/run/nuauth/ +else + echo "FATAL : User \"$NUAUTH_USER\" does not exist, but is supposed to run nuath" + exit -1 +fi + + +# ssl certificate generation +if [ -x /usr/bin/openssl ]; then + if [ ! -e $nuauth_tls_key ]; then + if [ ! -e $nuauth_tls_cert ]; then + + db_capb backup + db_settitle make-ssl-cert/title + + templates="countryname statename localityname organisationname ouname hostname email" + + for i in $templates; do + RET="" + while [ "x$RET" = "x" ]; do + db_fset make-ssl-cert/$i seen false + db_input high make-ssl-cert/$i || true + db_go + db_get make-ssl-cert/$i + done + done + + db_get make-ssl-cert/countryname + CountryName="$RET" + db_fset make-ssl-cert/countryname seen false + + db_get make-ssl-cert/statename + StateName="$RET" + db_fset make-ssl-cert/statename seen false + + db_get make-ssl-cert/localityname + LocalityName="$RET" + db_fset make-ssl-cert/localityname seen false + + db_get make-ssl-cert/organisationname + OrganisationName="$RET" + db_fset make-ssl-cert/organisationname seen false + + db_get make-ssl-cert/ouname + OUName="$RET" + db_fset make-ssl-cert/ouname seen false + + db_get make-ssl-cert/hostname + HostName="$RET" + db_fset make-ssl-cert/hostname seen false + + db_get make-ssl-cert/email + Email="$RET" + db_fset make-ssl-cert/email seen false + + # # should be a less common char + # problem is that openssl virtually accepts everything and we need to + # sacrifice one char. + + TMPFILE=`mktemp` || exit 1 + + sed -e s#@CountryName@#"$CountryName"# \ + -e s#@StateName@#"$StateName"# \ + -e s#@LocalityName@#"$LocalityName"# \ + -e s#@OrganisationName@#"$OrganisationName"# \ + -e s#@OUName@#"$OUName"# \ + -e s#@HostName@#"$HostName"# \ + -e s#@Email@#"$Email"# \ + /usr/share/ssl-cert/ssleay.cnf > $TMPFILE + + export RANDFILE=/dev/random + /usr/bin/openssl req -config $TMPFILE -new -x509 -nodes -keyout $nuauth_tls_key -pubkey -out $nuauth_tls_cert -days 1095 || /bin/true + chmod 640 $nuauth_tls_key + chown $NUAUTH_USER $nuauth_tls_key + rm -f $TMPFILE + fi + fi +fi + +db_stop + +#DEBHELPER# + +exit 0 --- nufw-2.2.15.orig/debian/nuauth.postrm +++ nufw-2.2.15/debian/nuauth.postrm @@ -0,0 +1,45 @@ +#! /bin/sh +# postrm script for nuauth +# +# see: dh_installdeb(1) + +set -e + +# summary of how this script can be called: +# * `remove' +# * `purge' +# * `upgrade' +# * `failed-upgrade' +# * `abort-install' +# * `abort-install' +# * `abort-upgrade' +# * `disappear' overwrit>r> +# for details, see /usr/doc/packaging-manual/ + +case "$1" in + purge|disappear) + +# update-rc.d -f nuauth remove >/dev/null + userdel nuauth 2>/dev/null || true + for FILE in /etc/nufw/nuauth.conf; do + # Taken from the ucf example postrm + for ext in '~' '%' .bak .dpkg-tmp .dpkg-new .dpkg-old .dpkg-dist .ucf-dist; do + rm -f $FILE$ext + done + rm -f $FILE + if which ucf >/dev/null 2>&1; then + ucf --purge $FILE + fi + done + ;; + remove|upgrade|failed-upgrade|abort-install|abort-upgrade) + # nothing + ;; +esac + +# dh_installdeb will replace this with shell code automatically +# generated by other debhelper scripts. + +#DEBHELPER# + + --- nufw-2.2.15.orig/debian/libnuclient-dev.install +++ nufw-2.2.15/debian/libnuclient-dev.install @@ -0,0 +1,4 @@ +src/clients/lib/.libs/libnuclient.so usr/lib +src/clients/lib/libnuclient.la usr/lib +src/clients/lib/nuclient.h usr/include/nuclient +src/include/nufw_source.h usr/include/nuclient --- nufw-2.2.15.orig/debian/nuauth-extra.install +++ nufw-2.2.15/debian/nuauth-extra.install @@ -0,0 +1,5 @@ +src/nuauth/modules/ipauth_guest/.libs/libipauth_guest.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/ipauth_guest/.libs/libipauth_guest.so.0 usr/lib/nuauth/modules +src/nuauth/modules/ipauth_guest/.libs/libipauth_guest.so usr/lib/nuauth/modules +src/nuauth/modules/ipauth_guest/libipauth_guest.la usr/lib/nuauth/modules +src/nuauth/modules/ipauth_guest/.libs/libipauth_guest.a usr/lib/nuauth/modules --- nufw-2.2.15.orig/debian/nufw.dirs +++ nufw-2.2.15/debian/nufw.dirs @@ -0,0 +1,2 @@ +etc/nufw/certs +usr/sbin --- nufw-2.2.15.orig/debian/nufw.init +++ nufw-2.2.15/debian/nufw.init @@ -0,0 +1,117 @@ +#! /bin/sh +# +# Written by Miquel van Smoorenburg . +# Modified for Debian +# by Ian Murdock . +# Customized for nufw by Vincent Deffontaines +# +# + +### BEGIN INIT INFO +# Provides: nufw-nfqueue +# Required-Start: $syslog +# Required-Stop: $syslog +# Should-Start: $local_fs +# Should-Stop: $local_fs +# Default-Start: 2 3 4 5 +# Default-Stop: 0 1 6 +# Short-Description: Control script for nufw +# Description: Init script to control (start/stop/reload) +# the nufw server. +### END INIT INFO + +PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin +DAEMON=/usr/sbin/nufw +NAME=nufw +PID=nufw +DESC=nufw +NUFW_START="false" + + +test -x $DAEMON || exit 0 + +# Include nufw defaults if available +if [ -f /etc/default/nufw ] ; then + . /etc/default/nufw +fi + +if [ "$NUFW_START" != "true" ]; then + exit 0 +fi + +NUFW_OPTIONS="" + +if [ -z "$NUFW_VERBOSITY" ]; then + NUFW_VERBOSITY="vv" +fi + +if [ "$NUFW_NUAUTH_ADDRESS" != "" ]; then + NUFW_OPTIONS="$NUFW_OPTIONS -d $NUFW_NUAUTH_ADDRESS" +fi + +if [ "$NUFW_NUAUTH_PORT" != "" ]; then + NUFW_OPTIONS="$NUFW_OPTIONS -p $NUFW_NUAUTH_PORT" +fi + +if [ "$NUFW_TIMEOUT" != "" ]; then + NUFW_OPTIONS="$NUFW_OPTIONS -t $NUFW_TIMEOUT" +fi + +if [ "$NUFW_TRACK_SIZE" != "" ]; then + NUFW_OPTIONS="$NUFW_OPTIONS -T $NUFW_TRACK_SIZE" +fi + +DAEMON_OPTS="-D -$NUFW_VERBOSITY \ + $NUFW_OPTIONS \ + -k $NUFW_SSL_KEY -c $NUFW_SSL_CERTIFICATE -C -M -m" + +set -e + +case "$1" in + start) + echo -n "Starting $DESC: " + start-stop-daemon --start --quiet --pidfile /var/run/$PID.pid \ + --exec $DAEMON -- $DAEMON_OPTS + echo "$NAME." + ;; + stop) + echo -n "Stopping $DESC: " + start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/$PID.pid \ + --retry 5 --exec $DAEMON + echo "$NAME." + ;; + #reload) + # + # If the daemon can reload its config files on the fly + # for example by sending it SIGHUP, do it here. + # + # If the daemon responds to changes in its config file + # directly anyway, make this a do-nothing entry. + # + # echo "Reloading $DESC configuration files." + # start-stop-daemon --stop --signal 1 --quiet --pidfile \ + # /var/run/$NAME.pid --exec $DAEMON + #;; + restart|force-reload) + # + # If the "reload" option is implemented, move the "force-reload" + # option to the "reload" entry above. If not, "force-reload" is + # just the same as "restart". + # + echo -n "Restarting $DESC: " + start-stop-daemon --stop --quiet --oknodo --pidfile \ + /var/run/$PID.pid --retry 5 --exec $DAEMON + sleep 1 + start-stop-daemon --start --quiet --pidfile \ + /var/run/$PID.pid --exec $DAEMON -- $DAEMON_OPTS + echo "$NAME." + ;; + *) + N=/etc/init.d/$NAME + # echo "Usage: $N {start|stop|restart|reload|force-reload}" >&2 + echo "Usage: $N {start|stop|restart|force-reload}" >&2 + exit 1 + ;; +esac + +exit 0 --- nufw-2.2.15.orig/debian/rules +++ nufw-2.2.15/debian/rules @@ -0,0 +1,497 @@ +#!/usr/bin/make -f +# -*- makefile -*- +# Sample debian/rules that uses debhelper. +# GNU copyright 1997 to 1999 by Joey Hess. + +# Uncomment this to turn on verbose mode. +#export DH_VERBOSE=1 +maindir = $(shell pwd) +b = $(shell pwd)/debian + + +# These are used for cross-compiling and for saving the configure script +# from having to guess our platform (since we know it already) +DEB_HOST_GNU_TYPE ?= $(shell dpkg-architecture -qDEB_HOST_GNU_TYPE) +DEB_BUILD_GNU_TYPE ?= $(shell dpkg-architecture -qDEB_BUILD_GNU_TYPE) + + +CFLAGS = -Wall -g + +ifneq (,$(findstring noopt,$(DEB_BUILD_OPTIONS))) + CFLAGS += -O0 +else + CFLAGS += -O2 +endif +ifeq (,$(findstring nostrip,$(DEB_BUILD_OPTIONS))) + INSTALL_PROGRAM += -s +endif + +# Which packages should we build? + +CONFIGURE = CFLAGS='$(CFLAGS)' ./configure --host=$(DEB_HOST_GNU_TYPE) --build=$(DEB_BUILD_GNU_TYPE) --prefix=/usr \ + --mandir=\$${prefix}/share/man --infodir=\$${prefix}/share/info --localstatedir=/var \ + --sysconfdir=/etc/nufw/ --with-mysql-log --with-pgsql-log --with-system-auth --with-ldap \ + --with-utf8 --with-nfqueue --with-nfconntrack --without-fixedtimeout --enable-pam-nufw \ + --with-prelude-log + # --with-utf8 --with-nfqueue --with-nfconntrack --with-fixedtimeout #FIXME : THIS line should be used + +config.status: configure + dh_testdir + # Add here commands to configure the package. + CFLAGS="$(CFLAGS)" ./configure --host=$(DEB_HOST_GNU_TYPE) --build=$(DEB_BUILD_GNU_TYPE) --prefix=/usr \ + --mandir=\$${prefix}/share/man --infodir=\$${prefix}/share/info --localstatedir=/var \ + --sysconfdir=/etc/nufw/ --with-mysql-log --with-pgsql-log --with-system-auth --with-ldap \ + --with-nfqueue --with-nfconntrack --with-fixedtimeout --with-utf8 --enable-pam-nufw \ + --with-prelude-log + +build: build-stamp + +clean: + dh_testdir + dh_testroot + rm -f build-stamp + rm -f build-nufw build-nufw-stamp + rm -f config-nufw-stamp install-stamp + + # Add here commands to clean up after the build process. + [ ! -f Makefile ] || $(MAKE) distclean + -find scripts/nuauth_command/ -name '*.pyc' -exec rm {} \; + [ ! -d scripts/nuauth_command/build ] || rm -rf scripts/nuauth_command/build + [ ! -f scripts/nuauth_command/scripts/nuauth_command ] || rm -f scripts/nuauth_command/scripts/nuauth_command + rm -f tests/inl_tests/libnobuffer.so + rm -f config.log + + dh_clean + +config-nufw: config-nufw-stamp +config-nufw-stamp: + dh_testdir -a + @echo "Doing $@" + [ ! -f Makefile ] || make clean + $(CONFIGURE) + touch config-nufw-stamp + +build-nufw:build-nufw-stamp +build-nufw-stamp: config-nufw-stamp + dh_testdir -a + @echo "Doing $@" + $(MAKE) + #$(MAKE) && \ + #(cd src/nufw && mv nufw nufw.plain); + touch build-nufw-stamp + +build-stamp: build-nufw + @echo "--- Compiling" + dh_testdir + touch build-stamp + +binary-arch: build nufw nuauth libnuclient3 libnuclient-dev nutcpc nuauth-extra nuauth-log-mysql nuauth-log-pgsql libpam-nufw nuauth-utils + +nufw: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ +# dh_install -p$@ -P$(b)/$@ +# rm debian/$@/usr/sbin/nufw + /usr/bin/install -m 755 src/nufw/nufw debian/nufw/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime + dh_installinit -p$@ -P$(b)/$@ -u"start 40 2 3 4 5 . stop 89 0 1 6 ." +# dh_installcron +# dh_installinfo + dh_installman -pnufw doc/nufw.8 + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + + +libnuclient3: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +libnuclient-dev: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -L libnuclient3 -l debian/libnuclient3/usr/lib -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +libpam-nufw: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime + +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +nuauth: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + mkdir -p $(CURDIR)/debian/$@/etc/nufw/ + dh_install -p$@ + sed -e "sµ^#\? *nuauth_tls_key=.*µnuauth_tls_key=\"/etc/nufw/certs/nuauth-key.pem\"µ" \ + -e "sµ^#\? *nuauth_tls_cert=.*µnuauth_tls_cert=\"/etc/nufw/certs/nuauth-cert.pem\"µ" \ + -e "sµ^ *plaintext_aclfile=.*µplaintext_aclfile=\"/etc/nufw/acls.nufw\"µ" \ + -e "sµ^ *plaintext_userfile=.*µplaintext_userfile=\"/etc/nufw/users-plaintext.nufw\"µ" \ + -e "sµ^ *nuauth_user_check_module=.*µnuauth_user_check_module=\"system\"µ" \ + < $(CURDIR)/conf/nuauth.conf >$(CURDIR)/debian/$@/etc/nufw/nuauth.conf + mv $(CURDIR)/debian/$@/etc/nufw/nuauth.conf $(CURDIR)/debian/$@/usr/share/nuauth/nuauth.conf + cp $(CURDIR)/conf/acls.nufw $(CURDIR)/debian/$@/etc/nufw/ + cp $(CURDIR)/conf/users-plaintext.nufw $(CURDIR)/debian/$@/etc/nufw/ + cp $(CURDIR)/conf/periods.xml $(CURDIR)/debian/$@/etc/nufw/ + pwd +# dh_install -p$@ -P$(b)/$@ +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_installinit -p$@ -P$(b)/$@ -u"start 40 2 3 4 5 . stop 89 0 1 6 ." + dh_installman -pnuauth doc/nuauth.8 + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +nuauth-extra: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +nuauth-log-mysql: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +nuauth-log-pgsql: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +nuauth-utils: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installdebconf -p$@ -P$(b)/$@ + cp $(CURDIR)/conf/nuaclgen.conf $(CURDIR)/debian/$@/etc/nufw/ + cp $(CURDIR)/conf/nutop.conf $(CURDIR)/debian/$@/etc/nufw/ + cp $(CURDIR)/scripts/nuaclgen $(CURDIR)/debian/$@/usr/bin + cp $(CURDIR)/scripts/nutop $(CURDIR)/debian/$@/usr/bin + cp $(CURDIR)/scripts/clean_conntrack.pl $(CURDIR)/debian/$@/usr/sbin + #make -C $(CURDIR)/scripts/nuauth_command install DESTDIR=$(CURDIR)/debian/$@/ + cd $(CURDIR)/scripts/nuauth_command && ./setup.py install --no-compile \ + --install-lib=$(CURDIR)/debian/$@/usr/share/python-support/nuauth_command \ + --prefix=$(CURDIR)/debian/$@/usr + #find $(CURDIR)/debian/$@/ -name \*.pyc -exec rm -f {} \; + dh_python + dh_pysupport +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_installman -pnuauth-utils doc/nuaclgen.8 + dh_installman -pnuauth-utils doc/nutop.8 + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +nutcpc: + @echo "--- Building: $@" + dh_installdirs -p$@ -P$(b)/$@ + dh_testdir -p$@ -P$(b)/$@ + dh_testroot -p$@ -P$(b)/$@ + dh_installchangelogs -p$@ -P$(b)/$@ ChangeLog + dh_installdocs -p$@ -P$(b)/$@ + dh_installexamples -p$@ -P$(b)/$@ + dh_install -p$@ +# rm debian/$@/usr/sbin/nufw +# dh_installmenu + dh_installman -pnutcpc doc/nutcpc.1 + dh_installdebconf -p$@ -P$(b)/$@ +# dh_installlogrotate +# dh_installemacsen +# dh_installpam +# dh_installmime +# dh_installcron +# dh_installinfo + dh_link -p$@ -P$(b)/$@ + dh_strip -p$@ -P$(b)/$@ + dh_compress -p$@ -P$(b)/$@ + dh_fixperms -p$@ -P$(b)/$@ +# dh_perl +# dh_python + dh_makeshlibs -p$@ -P$(b)/$@ -n + dh_installdeb -p$@ -P$(b)/$@ + dh_shlibdeps -L libnuclient3 -l debian/libnuclient3/usr/lib -p$@ -P$(b)/$@ + dh_gencontrol -p$@ -P$(b)/$@ + dh_md5sums -p$@ -P$(b)/$@ + dh_builddeb -p$@ -P$(b)/$@ + +install: install-stamp +install-stamp: + dh_testdir -a + @echo "Installing $@" + dh_testroot -a +# dh_clean -k -a +# dh_installdirs -a + + # Add here commands to install the package into debian/nufw. + #$(MAKE) install DESTDIR=$(CURDIR)/debian/tmp/ +#default certificates +# cp $(CURDIR)/conf/certs/nufw-key.pem $(CURDIR)/debian/tmp/etc/nufw/certs +# cp $(CURDIR)/conf/certs/nufw-cert.pem $(CURDIR)/debian/tmp/etc/nufw/certs +# cp $(CURDIR)/conf/certs/nuauth-key.pem $(CURDIR)/debian/tmp/etc/nufw/certs +# cp $(CURDIR)/conf/certs/nuauth-cert.pem $(CURDIR)/debian/tmp/etc/nufw/certs + +# cp $(CURDIR)/conf/nufw.init $(CURDIR)/debian/tmp/etc/init.d/nufw +# cp $(CURDIR)/conf/nuauth $(CURDIR)/debian/tmp/etc/init.d/nuauth +# chmod 755 $(CURDIR)/debian/tmp/etc/init.d/* +# ln -s $(CURDIR)/debian/tmp/usr/lib/nuauth $(CURDIR)/debian/tmp/usr/lib/nuauth + touch $(maindir)/install-stamp + + +# Build architecture-independent files here. +binary-indep: build install +# We have nothing to do by default. + +# Build architecture-dependent files here. +binary-arch: build install +# dh_testdir $(dhbuildpackages) +# dh_testroot $(dhbuildpackages) +# dh_installchangelogs $(dhbuildpackages) ChangeLog +# dh_installdocs $(dhbuildpackages) +# dh_installexamples $(dhbuildpackages) +# dh_install $(dhbuildpackages) --sourcedir=debian/tmp +## dh_installmenu +# dh_installdebconf $(dhbuildpackages) +## dh_installlogrotate +## dh_installemacsen +## dh_installpam +## dh_installmime +# dh_installinit $(dhbuildpackages) -u"start 40 2 3 4 5 . stop 89 0 1 6 ." +## dh_installcron +## dh_installinfo +# dh_installman -pnufw doc/nufw.1 +# dh_installman -pnuauth doc/nuauth.1 +# dh_installman -pnutcpc doc/nutcpc.1 +# dh_installman -pnuauth-utils doc/nuaclgen.1 +# dh_installman -pnuauth-utils doc/nutop.1 +# dh_link $(dhbuildpackages) +# dh_strip $(dhbuildpackages) +# dh_compress $(dhbuildpackages) +# dh_fixperms $(dhbuildpackages) +## dh_perl +## dh_python +# dh_makeshlibs $(dhbuildpackages) -n +# dh_installdeb $(dhbuildpackages) +# dh_shlibdeps $(dhbuildpackages) +# dh_gencontrol $(dhbuildpackages) +# dh_md5sums $(dhbuildpackages) +# dh_builddeb $(dhbuildpackages) + +binary: binary-indep binary-arch +.PHONY: build clean binary-indep binary-arch binary install --- nufw-2.2.15.orig/debian/watch +++ nufw-2.2.15/debian/watch @@ -0,0 +1,11 @@ +# debian watch file +# You can run the "uscan" command +# to check for upstream updates and more. +# See uscan(1) for format + +# Compulsory line, this is a version 3 file +version=3 + +#http://nufw.org/download/nufw/nufw-2.2.3.tar.gz +http://nufw.org/download/nufw/nufw-([0-9].*)\.tar\.gz + --- nufw-2.2.15.orig/debian/nufw.install +++ nufw-2.2.15/debian/nufw.install @@ -0,0 +1 @@ +usr/sbin/nufw --- nufw-2.2.15.orig/debian/changelog +++ nufw-2.2.15/debian/changelog @@ -0,0 +1,497 @@ +nufw (2.2.15-1build1) intrepid; urgency=low + + * No-change rebuild for libgnutls13 -> libgnutls26 transistion. + + -- Steve Kowalik Sat, 11 Oct 2008 01:30:40 +1100 + +nufw (2.2.15-1) unstable; urgency=low + + * New upstream release + * Rebuild with support for several python versions (Closes: #476238) + + -- Pierre Chifflier Tue, 15 Apr 2008 15:54:47 +0200 + +nufw (2.2.14-2) unstable; urgency=low + + * Rebuild for python transition (Closes: #476173) + + -- Pierre Chifflier Tue, 15 Apr 2008 09:16:45 +0200 + +nufw (2.2.14-1) unstable; urgency=low + + * New upstream release + * Debian directory is now separated from upstream + + -- Pierre Chifflier Tue, 08 Apr 2008 15:15:58 +0200 + +nufw (2.2.13-2) unstable; urgency=low + + * Backport patch from upstream to fix build (error with inline functions) + + -- Pierre Chifflier Thu, 03 Apr 2008 11:50:15 +0200 + +nufw (2.2.13-1) unstable; urgency=low + + * New upstream release + + -- Pierre Chifflier Wed, 02 Apr 2008 12:12:11 +0200 + +nufw (2.2.11-2) unstable; urgency=low + + * Fix bashism in NuFW init script (Closes: #465013) + * Fix spelling in control (mysql -> MySQL) + + -- Pierre Chifflier Sun, 10 Feb 2008 18:22:09 +0100 + +nufw (2.2.11-1) unstable; urgency=low + + * New upstream release + * Bump standards version + + -- Pierre Chifflier Wed, 09 Jan 2008 09:24:33 +0100 + +nufw (2.2.10-2) unstable; urgency=low + + * Add python-ipy to build-deps + + -- Pierre Chifflier Wed, 05 Dec 2007 14:13:55 +0100 + +nufw (2.2.10-1) unstable; urgency=low + + * New upstream release + + -- Pierre Chifflier Wed, 05 Dec 2007 09:37:11 +0100 + +nufw (2.2.9-3) unstable; urgency=low + + * Change build order and tell dh_shlibdeps to search libs in correct dir .. + + -- Pierre Chifflier Fri, 30 Nov 2007 13:47:36 +0100 + +nufw (2.2.9-2) unstable; urgency=low + + * Tell dh_shlibdeps to use libnuclient3 + + -- Pierre Chifflier Fri, 30 Nov 2007 12:01:34 +0100 + +nufw (2.2.9-1) unstable; urgency=low + + * New upstream release + + -- Pierre Chifflier Mon, 26 Nov 2007 12:17:37 +0100 + +nufw (2.2.8-1) unstable; urgency=low + + * New upstream release + * Create directory /var/run/nuauth in package + * Do not use --enable-debug, so it does not flood the log with debug + messages + + -- Pierre Chifflier Tue, 13 Nov 2007 13:56:41 +0100 + +nufw (2.2.7-1) unstable; urgency=low + + * New upstream release + + -- Pierre Chifflier Mon, 29 Oct 2007 20:09:27 +0100 + +nufw (2.2.6-3) unstable; urgency=low + + * Enable Prelude module + + -- Pierre Chifflier Sun, 28 Oct 2007 09:36:37 +0100 + +nufw (2.2.6-2) unstable; urgency=low + + * Make libnuclient-dev depend on libnuclient3 + + -- Pierre Chifflier Fri, 26 Oct 2007 17:53:04 +0200 + +nufw (2.2.6-1) unstable; urgency=low + + * New upstream release + + -- Pierre Chifflier Wed, 10 Oct 2007 11:57:28 +0200 + +nufw (2.2.5-2) unstable; urgency=low + + * Add binary package libnuclient-dev + + -- Pierre Chifflier Wed, 12 Sep 2007 21:41:39 +0200 + +nufw (2.2.5-1) unstable; urgency=low + + * New upstream release + + -- Pierre Chifflier Tue, 11 Sep 2007 16:05:35 +0200 + +nufw (2.2.4-1) unstable; urgency=low + + * New upstream release + * Add nuauth-command script to nuauth-utils + * Use python-support for nuauth-utils + * Update nuauth-utils dependencies + + -- Pierre Chifflier Mon, 20 Aug 2007 23:18:37 +0200 + +nufw (2.2.3-2) unstable; urgency=low + + * Fix init script (Closes: #436958) + * Move system files to nuauth (Closes: #427973) + * Add --retry to really wait for script exit + + -- Pierre Chifflier Mon, 13 Aug 2007 15:14:06 +0200 + +nufw (2.2.3-1) unstable; urgency=low + + * New upstream release + * Add watch file + * Update my mail address + + -- Pierre Chifflier Sun, 05 Aug 2007 22:28:35 +0200 + +nufw (2.2.2-2) unstable; urgency=low + + * Also move system backend to nuauth (Closes: #427973) + + -- Pierre Chifflier Wed, 04 Jul 2007 11:30:30 +0200 + +nufw (2.2.2-1) unstable; urgency=medium + + * New upstream release + + restore compatibility with 2.0 versions + + not compatible with 2.2.1 + * Do not include plaintext files in nuauth-extra (Closes: #427973) + * Urgency=medium because of RC bug + + -- Pierre Chifflier Tue, 26 Jun 2007 16:48:15 +0200 + +nufw (2.2.1-1) unstable; urgency=low + + * New upstream release + * Change build dependency from postgresql-dev to libpq-dev + + -- Pierre Chifflier Mon, 18 Jun 2007 11:22:34 +0200 + +nufw (2.2.0-3) unstable; urgency=high + + * Move module plaintext to nuauth (Closes: #427973) + * Urgency=high because of RC bug + * Remove dependency on libnuclient3, now correctly detected by dh_shlibdeps + + -- Pierre Chifflier Fri, 08 Jun 2007 11:36:36 +0200 + +nufw (2.2.0-2) unstable; urgency=high + + * Conficts/Replaces package libnuclient (Closes: #427611) + * Urgency=high because of RC bug + + -- Pierre Chifflier Tue, 05 Jun 2007 14:44:13 +0200 + +nufw (2.2.0-1) unstable; urgency=low + + * New upstream release + * Complete rewrite of the package + * Remove templates (Closes: #414507, #420931, #361428) + * Set nuauth-utils arch to all (Closes: #419923) + * Set myself as Maintainer, with Jean-Michel's agreement + * Update libnuclient files location + * Update copyright file + * Update dependencies on debconf + * Spell check packages descriptions + * Add LSB sections to init scripts + * Remove dependencies on libnetfilter*, detected by dh_shlibdeps + * Rename libnuclient to libnuclient3 + * Remove debconf stuff, not needed + * Use ucf for nuauth.conf + + -- Pierre Chifflier Tue, 29 May 2007 09:26:17 +0200 + +nufw (2.0.16-1) unstable; urgency=low + + * New upstream release (Closes: #411515) + * Ack NMU (Closes: #378385) + * Add myself to Uploaders + * Bump Standards version to 3.7.2 + * Add LSB sections to init scripts + * Update depends on debconf + * Change libpam-nufw description to be less than 80 characters + * Change dependency to libpq-dev (Closes: #409768) + * Update Czech template (Closes: #412697) + + -- Pierre Chifflier Fri, 16 Mar 2007 16:24:56 +0100 + +nufw (2.0.9-5.2) unstable; urgency=high + + * Non-maintainer upload. + * Added nauth: missing pre-dep on passwd (Closes: #408269) + - added pre-dep on adduser too, since it uses adduser in preinst + * Urgency high due RCness + + -- Bastian Venthur Thu, 1 Feb 2007 11:54:30 +0100 + +nufw (2.0.9-5.1) unstable; urgency=low + + * Non-maintainer upload to fix longstanding l10n issues + * Add debconf-updatepo to the clean target in debian/rules + Closes: #349839 + * add the nufw20.templates and nuauth20.templates files to + debian/po/POTFILES.in so that these files are translated too + * General rewrite of the debconf templates in a desperate attempt to + have them DevRef compliant, remove untranslatable strings and, + unfortunately, drive translators crazy. Closes: #361423 + * Fix typo in the package description. Closes: #390090 + * Lintian fixes: + - Remove redundant declaration of conffiles in /etc. Closes: #356772 + * Debconf translation updates: + - French updated + - Czech updated. Closes: #345142 + - Swedish updated. Closes: #347608 + - German added. Sent during the call for updates for the NMU campaign. + - Russian added. Sent during the call for updates for the NMU campaign. + + -- Christian Perrier Sun, 3 Dec 2006 12:14:00 +0100 + +nufw (2.0.9-5) unstable; urgency=low + + * One more patch for compilation on hppa. + + -- Jean-Michel Kelbert Sat, 2 Dec 2006 12:31:12 +0100 + +nufw (2.0.9-4) unstable; urgency=low + + * Apply a patch provided by upstream to compile on hppa. This time it should + work ! + + -- Jean-Michel Kelbert Tue, 28 Nov 2006 21:12:17 +0100 + +nufw +(2.0.9-3) unstable; urgency=low + + * Apply a patch provided by upstream to compile on hppa. + + -- Jean-Michel Kelbert Thu, 9 Nov 2006 21:41:03 +0100 + +nufw (2.0.9-2) unstable; urgency=low + + * Change copyright file to not include the entire GPL. + + -- Jean-Michel Kelbert Wed, 1 Nov 2006 20:04:30 +0100 + +nufw (2.0.9-1) unstable; urgency=low + + * New upstream release. + * Adapt packaging to version 2. + * Many thanks to Vincent Deffontaines for its packaging. + + -- Jean-Michel Kelbert Mon, 9 Oct 2006 21:58:20 +0200 + +nufw (1.0.23-1.1) unstable; urgency=high + + * Non-maintainer upload. + * Unbreak syntactically wrong debconf template, which caused problems + during package installation. (Closes: #360581) + + -- Steinar H. Gunderson Sun, 16 Jul 2006 00:02:00 +0200 + +nufw (1.0.23-1) unstable; urgency=low + + * New upstream release + * Update debconf configuration to take care of new options. + * Upgrade build depends to libmysqlclient15-dev + (closes: #356719) + + -- Jean-Michel Kelbert Thu, 30 Mar 2006 21:01:38 +0200 + +nufw (1.0.16-1) unstable; urgency=low + + * New upstream release. This is a security release. The NuFW team has + identified a problem that could lead to Denial of Service from legitimate + users of the authentication service. + This has been assigned CVE-2005-3950. + (closes: #341544) + * Add debconf-updatepo in debian/rules. + (closes: #329942) + * Add debconf-2.0 as an alternate to debconf. + (closes: #332049) + * Use gnutls12 instead of gnutls11. + (closes: #335769) + * Update the French translation for debconf. + (closes: #332575) + * Add the Swedish translation for debconf. + (closes: #336780) + + -- Jean-Michel Kelbert Tue, 27 Dec 2005 17:04:58 +0100 + +nufw (1.0.13-1) unstable; urgency=low + + * New upstream release + + -- Jean-Michel Kelbert Sun, 16 Oct 2005 18:12:39 +0200 + +nufw (1.0.11-1) unstable; urgency=low + + * Add the Vietnamese translation for debconf. + (closes: #316322) + * Add the French translation for debconf. + (closes: #307763) + * Add the Czech translation for debconf. + (closes: #310700) + + -- Jean-Michel Kelbert Fri, 2 Sep 2005 22:02:12 +0200 + +nufw (1.0.10-1) stable; urgency=low + + * new upstream release + + -- Eric Leblond Mon, 4 Jul 2005 11:32:01 +0200 + +nufw (1.0.8-1) unstable; urgency=low + + * new upstream release + + -- Eric Leblond Fri, 10 Jun 2005 15:46:35 +0200 + +nufw (1.0.7-1) unstable; urgency=low + + * new upstream release + + -- Eric Leblond Wed, 8 Jun 2005 09:46:42 +0200 + +nufw (1.0.6-1) unstable; urgency=low + + * new upstream release + + -- Eric Leblond Thu, 2 Jun 2005 21:56:16 +0200 + +nufw (1.0.5-1) unstable; urgency=low + + * new upstream release + + -- Eric Leblond Thu, 12 May 2005 12:20:42 +0200 + +nufw (1.0.3-1) unstable; urgency=low + + * new upstream release + + -- Eric Leblond Wed, 20 Apr 2005 09:17:25 +0200 + +nufw (1.0.2-1) unstable; urgency=low + + * new upstream release + + -- Eric Leblond Tue, 29 Mar 2005 07:16:56 +0200 + +nufw (1.0.1-1) unstable; urgency=low + + * New upstream release. + + -- Eric Leblond Tue, 15 Mar 2005 23:22:12 +0100 + +nufw (1.0-1) unstable; urgency=low + + * New upstream release. + * Add --with-system-auth to configure in debian/rules to support PAM+NSS + authentication. + * Add --with-ldap to support LDAP directory for users and acl lookup. + * Add --with-gdbm to support gdbm users lookup. + * Add --with-ident to support support ident users authentication. + * Add libgcrypt11-dev, libgnutls11-dev, libident-dev, libpam-dev to + Build-Depends. + * Add postrm and preinst for nuauth. + + -- Jean-Michel Kelbert Tue, 22 Feb 2005 22:53:22 +0100 + +nufw (0.8.5-3) unstable; urgency=low + + * Change debian/copyright to reflect changes made by upstreams to the + license. + * Initial upload in Debian. Thanks to Vincent Deffontaines for packaging the + package before me. + (closes: #258746) + + -- Jean-Michel Kelbert Mon, 20 Dec 2004 22:23:16 +0100 + +nufw (0.8.5-1) unstable; urgency=low + + * New upstream release. + * Upstream add an exception to the GPL which allows linking with OpenSSL. + + -- Jean-Michel Kelbert Wed, 1 Sep 2004 23:03:10 +0200 + +nufw (0.8.2-1) unstable; urgency=low + + * Update Description in debian/control. Thanks to Brandon Robinson. + * Switch to gettext for the debconf templates. + * Change the way of packaging. + * Correct minor policy violations. + + -- Jean-Michel Kelbert Fri, 30 Jul 2004 13:41:25 +0200 + +nufw (0.8.1-1) unstable; urgency=low + + * New upstream version. Adds a paquet for libnuclient, the client + authentication library. + + -- Vincent Deffontaines Mon, 19 Jul 2004 21:23:13 +0200 + +nufw (0.8.0-1) unstable; urgency=low + + * New upstream version. Adds the strict logs update option, together with + some scaling bugfix, that would cause nuauth to grow heavily on some + particular [DoS] conditions. + + -- Vincent Deffontaines Mon, 5 Jul 2004 21:23:13 +0200 + +nufw (0.7.1-1) unstable; urgency=low + + * New upstream version. Fixes some bug that would rarely memleak nuauth. + Adds the SQL sync option. + + -- Vincent Deffontaines Fri, 11 Jun 2004 18:08:19 +0200 + +nufw (0.7.0-1) unstable; urgency=low + + * New upstream version. 0.7.0 is the first release with SSL connections all + the way. + + -- Vincent Deffontaines Tue, 30 Mar 2004 21:18:37 +0200 + +nufw (0.6.5-1) unstable; urgency=low + + * New upstream version + + -- Vincent Deffontaines Sun, 14 Mar 2004 18:52:38 +0100 + +nufw (0.6.4-1) unstable; urgency=low + + * New upstream version + * Splitted debian nuauth packages into 3, so that modules support is ... + modular + + -- Vincent Deffontaines Wed, 7 Jan 2004 23:49:34 +0100 + +nufw (0.6.3-1) unstable; urgency=low + + * Nesw upstream version + + -- Vincent Deffontaines Wed, 7 Jan 2004 00:33:47 +0100 + +nufw (0.6.2-1) unstable; urgency=low + + * Upstream changed to 0.6.2 + + -- Vincent Deffontaines Sun, 4 Jan 2004 23:42:57 +0100 + +nufw (0.6.1-1) unstable; urgency=low + + * Upstream changed to 0.6.1 + + -- Vincent Deffontaines Mon, 22 Dec 2003 15:55:24 +0100 + +nufw (0.5.4-1) unstable; urgency=low + + * Initial Release. + + -- Vincent Deffontaines Thu, 13 Nov 2003 13:03:54 +0100 + --- nufw-2.2.15.orig/debian/nufw.default +++ nufw-2.2.15/debian/nufw.default @@ -0,0 +1,21 @@ +#Change to "true" for Nufw to be started +NUFW_START="true" + +#Add "v"s so nufw gets more verbose +NUFW_VERBOSITY="vv" + +#Address of the nuauth server +#NUFW_NUAUTH_ADDRESS="127.0.0.1" + +#UDP port the nuauth server listens on +#NUFW_NUAUTH_PORT=4128 + +#Timeout to forget about packets when there's no match (seconds) +#NUFW_TIMEOUT=15 + +#Track Size +#NUFW_TRACK_SIZE=1000 + +#SSL certificates and keys +NUFW_SSL_CERTIFICATE="/etc/nufw/certs/nufw-cert.pem" +NUFW_SSL_KEY="/etc/nufw/certs/nufw-key.pem" --- nufw-2.2.15.orig/debian/nuauth-log-mysql.install +++ nufw-2.2.15/debian/nuauth-log-mysql.install @@ -0,0 +1,5 @@ +src/nuauth/modules/log_mysql/.libs/libmysql.a usr/lib/nuauth/modules +src/nuauth/modules/log_mysql/libmysql.la usr/lib/nuauth/modules +src/nuauth/modules/log_mysql/.libs/libmysql.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/log_mysql/.libs/libmysql.so.0 usr/lib/nuauth/modules +src/nuauth/modules/log_mysql/.libs/libmysql.so usr/lib/nuauth/modules --- nufw-2.2.15.orig/debian/nuauth-utils.install +++ nufw-2.2.15/debian/nuauth-utils.install @@ -0,0 +1,5 @@ +conf/nuaclgen.conf etc/nufw +conf/nutop.conf etc/nufw +scripts/nuaclgen usr/bin +scripts/nutop usr/bin +scripts/clean_conntrack.pl usr/sbin --- nufw-2.2.15.orig/debian/libnuclient-dev.dirs +++ nufw-2.2.15/debian/libnuclient-dev.dirs @@ -0,0 +1 @@ +usr/include/nuclient --- nufw-2.2.15.orig/debian/libpam-nufw.dirs +++ nufw-2.2.15/debian/libpam-nufw.dirs @@ -0,0 +1 @@ +lib/security --- nufw-2.2.15.orig/debian/nuauth.install +++ nufw-2.2.15/debian/nuauth.install @@ -0,0 +1,54 @@ +conf/nuauth.conf etc/nufw +conf/periods.xml etc/nufw +conf/acls.nufw etc/nufw +conf/users-plaintext.nufw etc/nufw +src/nuauth/nuauth usr/sbin +src/nuauth/modules/ldap/.libs/libldap.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/ldap/.libs/libldap.so.0 usr/lib/nuauth/modules +src/nuauth/modules/ldap/.libs/libldap.so usr/lib/nuauth/modules +src/nuauth/modules/ldap/libldap.la usr/lib/nuauth/modules +src/nuauth/modules/ldap/.libs/libldap.a usr/lib/nuauth/modules +src/nuauth/modules/plaintext/.libs/libplaintext.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/plaintext/.libs/libplaintext.so.0 usr/lib/nuauth/modules +src/nuauth/modules/plaintext/.libs/libplaintext.so usr/lib/nuauth/modules +src/nuauth/modules/plaintext/libplaintext.la usr/lib/nuauth/modules +src/nuauth/modules/plaintext/.libs/libplaintext.a usr/lib/nuauth/modules +src/nuauth/modules/system/.libs/libsystem.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/system/.libs/libsystem.so.0 usr/lib/nuauth/modules +src/nuauth/modules/system/.libs/libsystem.so usr/lib/nuauth/modules +src/nuauth/modules/system/libsystem.la usr/lib/nuauth/modules +src/nuauth/modules/system/.libs/libsystem.a usr/lib/nuauth/modules +src/nuauth/modules/log_syslog/.libs/libsyslog.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/log_syslog/.libs/libsyslog.so.0 usr/lib/nuauth/modules +src/nuauth/modules/log_syslog/.libs/libsyslog.so usr/lib/nuauth/modules +src/nuauth/modules/log_syslog/libsyslog.la usr/lib/nuauth/modules +src/nuauth/modules/log_syslog/.libs/libsyslog.a usr/lib/nuauth/modules +src/nuauth/modules/xml_defs/.libs/libxml_defs.so usr/lib/nuauth/modules +src/nuauth/modules/xml_defs/.libs/libxml_defs.so.0 usr/lib/nuauth/modules +src/nuauth/modules/xml_defs/.libs/libxml_defs.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/xml_defs/.libs/libxml_defs.a usr/lib/nuauth/modules +src/nuauth/modules/xml_defs/libxml_defs.la usr/lib/nuauth/modules +src/nuauth/modules/x509_std/.libs/libx509_std.so usr/lib/nuauth/modules +src/nuauth/modules/x509_std/.libs/libx509_std.so.0 usr/lib/nuauth/modules +src/nuauth/modules/x509_std/.libs/libx509_std.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/x509_std/.libs/libx509_std.a usr/lib/nuauth/modules +src/nuauth/modules/x509_std/libx509_std.la usr/lib/nuauth/modules +src/nuauth/modules/mark_uid/.libs/libmark_uid.so usr/lib/nuauth/modules +src/nuauth/modules/mark_uid/.libs/libmark_uid.so.0 usr/lib/nuauth/modules +src/nuauth/modules/mark_uid/.libs/libmark_uid.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/mark_uid/.libs/libmark_uid.a usr/lib/nuauth/modules +src/nuauth/modules/mark_uid/libmark_uid.la usr/lib/nuauth/modules +src/nuauth/modules/mark_group/.libs/libmark_group.so usr/lib/nuauth/modules +src/nuauth/modules/mark_group/.libs/libmark_group.so.0 usr/lib/nuauth/modules +src/nuauth/modules/mark_group/.libs/libmark_group.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/mark_group/.libs/libmark_group.a usr/lib/nuauth/modules +src/nuauth/modules/mark_group/libmark_group.la usr/lib/nuauth/modules +src/nuauth/modules/session_expire/.libs/libsession_expire.so usr/lib/nuauth/modules +src/nuauth/modules/session_expire/.libs/libsession_expire.so.0 usr/lib/nuauth/modules +src/nuauth/modules/session_expire/.libs/libsession_expire.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/session_expire/.libs/libsession_expire.a usr/lib/nuauth/modules +src/nuauth/modules/session_expire/libsession_expire.la usr/lib/nuauth/modules +src/nuauth/modules/log_nuprelude/.libs/libnuprelude.so usr/lib/nuauth/modules +src/nuauth/modules/log_nuprelude/.libs/libnuprelude.so.0 usr/lib/nuauth/modules +src/nuauth/modules/log_nuprelude/.libs/libnuprelude.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/log_nuprelude/.libs/libnuprelude.a usr/lib/nuauth/modules --- nufw-2.2.15.orig/debian/nuauth-log-pgsql.dirs +++ nufw-2.2.15/debian/nuauth-log-pgsql.dirs @@ -0,0 +1 @@ +usr/lib --- nufw-2.2.15.orig/debian/nuauth-log-pgsql.docs +++ nufw-2.2.15/debian/nuauth-log-pgsql.docs @@ -0,0 +1 @@ +conf/nulog.pgsql.dump --- nufw-2.2.15.orig/debian/nufw.postinst +++ nufw-2.2.15/debian/nufw.postinst @@ -0,0 +1,82 @@ +#!/bin/sh +CONFIGFILE=/etc/default/nufw + +set -e +#set -x +. /usr/share/debconf/confmodule + +# ssl certificate generation +if [ -x /usr/bin/openssl ]; then + if [ ! -e /etc/nufw/certs/nufw-key.pem ]; then + + db_capb backup + db_settitle make-ssl-cert/title + + templates="countryname statename localityname organisationname ouname hostname email" + + for i in $templates; do + RET="" + while [ "x$RET" = "x" ]; do + db_fset make-ssl-cert/$i seen false + db_input high make-ssl-cert/$i || true + db_go + db_get make-ssl-cert/$i + done + done + + db_get make-ssl-cert/countryname + CountryName="$RET" + db_fset make-ssl-cert/countryname seen false + + db_get make-ssl-cert/statename + StateName="$RET" + db_fset make-ssl-cert/statename seen false + + db_get make-ssl-cert/localityname + LocalityName="$RET" + db_fset make-ssl-cert/localityname seen false + + db_get make-ssl-cert/organisationname + OrganisationName="$RET" + db_fset make-ssl-cert/organisationname seen false + + db_get make-ssl-cert/ouname + OUName="$RET" + db_fset make-ssl-cert/ouname seen false + + db_get make-ssl-cert/hostname + HostName="$RET" + db_fset make-ssl-cert/hostname seen false + + db_get make-ssl-cert/email + Email="$RET" + db_fset make-ssl-cert/email seen false + + # # should be a less common char + # problem is that openssl virtually accepts everything and we need to + # sacrifice one char. + + TMPFILE=`mktemp` || exit 1 + + sed -e s#@CountryName@#"$CountryName"# \ + -e s#@StateName@#"$StateName"# \ + -e s#@LocalityName@#"$LocalityName"# \ + -e s#@OrganisationName@#"$OrganisationName"# \ + -e s#@OUName@#"$OUName"# \ + -e s#@HostName@#"$HostName"# \ + -e s#@Email@#"$Email"# \ + /usr/share/ssl-cert/ssleay.cnf > $TMPFILE + + export RANDFILE=/dev/random + /usr/bin/openssl req -config $TMPFILE -new -x509 -nodes -keyout /etc/nufw/certs/nufw-key.pem -pubkey -out /etc/nufw/certs/nufw-cert.pem -days 1095 || /bin/true + chmod 600 /etc/nufw/certs/nufw-key.pem + rm -f $TMPFILE + fi +fi + +db_stop + + +#DEBHELPER# + +exit 0 --- nufw-2.2.15.orig/debian/compat +++ nufw-2.2.15/debian/compat @@ -0,0 +1 @@ +4 --- nufw-2.2.15.orig/debian/nuauth.preinst +++ nufw-2.2.15/debian/nuauth.preinst @@ -0,0 +1,50 @@ +#!/bin/sh + +set -e + +# summary of how this script can be called: +# * `install' +# * `install' +# * `upgrade' +# * `abort-upgrade' + +case "$1" in + install|upgrade) + # 1. create group if not existing + addgroup --quiet --system nuauth 2>/dev/null || true + # 2. create homedir if not existing + test -d /var/run/nuauth || mkdir -p /var/run/nuauth + # 3. create user if not existing + adduser --quiet \ + --system \ + --ingroup nuauth \ + --no-create-home \ + --disabled-password \ + nuauth 2>/dev/null || true + # 4. adjust passwd entry + usermod -c "Nuauth for NuFW" \ + -d /var/run/nuauth \ + -g nuauth \ + nuauth + # 5. adjust file and directory permissions + chown -R nuauth.nuauth /var/run/nuauth + chmod u=rwx,g=rx,o= /var/run/nuauth + ;; + configure) + ;; + abort-upgrade) + ;; + *) + echo "preinst called with unknown argument \`$1'" >&2 + exit 0 + ;; +esac + +# dh_installdeb will replace this with shell code automatically +# generated by other debhelper scripts. + +#DEBHELPER# + +exit 0 + + --- nufw-2.2.15.orig/debian/nuauth-log-pgsql.install +++ nufw-2.2.15/debian/nuauth-log-pgsql.install @@ -0,0 +1,5 @@ +src/nuauth/modules/log_pgsql/.libs/libpgsql.a usr/lib/nuauth/modules +src/nuauth/modules/log_pgsql/libpgsql.la usr/lib/nuauth/modules +src/nuauth/modules/log_pgsql/.libs/libpgsql.so.0.0.0 usr/lib/nuauth/modules +src/nuauth/modules/log_pgsql/.libs/libpgsql.so.0 usr/lib/nuauth/modules +src/nuauth/modules/log_pgsql/.libs/libpgsql.so usr/lib/nuauth/modules --- nufw-2.2.15.orig/debian/nuauth-utils.dirs +++ nufw-2.2.15/debian/nuauth-utils.dirs @@ -0,0 +1 @@ +etc/nufw --- nufw-2.2.15.orig/debian/nuauth.dirs +++ nufw-2.2.15/debian/nuauth.dirs @@ -0,0 +1,5 @@ +etc/nufw/certs +etc/default +usr/sbin +usr/share/nuauth +var/run/nuauth --- nufw-2.2.15.orig/debian/nuauth.docs +++ nufw-2.2.15/debian/nuauth.docs @@ -0,0 +1,4 @@ +NEWS +README +TODO +conf/acls.schema --- nufw-2.2.15.orig/debian/libnuclient3.postinst +++ nufw-2.2.15/debian/libnuclient3.postinst @@ -0,0 +1,19 @@ +#!/bin/sh + +set -e + +# dh_installdeb will replace this with shell code automatically +# generated by other debhelper scripts. + +case "$1" in + configure) + + ldconfig + + ;; +esac + +#DEBHELPER# + +exit 0 + --- nufw-2.2.15.orig/debian/nuauth.init +++ nufw-2.2.15/debian/nuauth.init @@ -0,0 +1,102 @@ +#! /bin/sh +# +# Written by Miquel van Smoorenburg . +# Modified for Debian +# by Ian Murdock . +# Customized for nuauth by Vincent Deffontaines +# +# + +### BEGIN INIT INFO +# Provides: nuauth +# Required-Start: $syslog +# Required-Stop: $syslog +# Should-Start: $local_fs +# Should-Stop: $local_fs +# Default-Start: 2 3 4 5 +# Default-Stop: 0 1 6 +# Short-Description: Control script for nuauth +# Description: Init script to control (start/stop/reload) +# the nuauth server. +### END INIT INFO + +PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin +DAEMON=/usr/sbin/nuauth +PID=nuauth +NAME=nuauth +DESC=nuauth +NUAUTH_START="no" + + +test -x $DAEMON || exit 0 + +# Include nuauth defaults if available +if [ -f /etc/default/nuauth ] ; then + . /etc/default/nuauth +fi + +if [ "$NUAUTH_START" != "true" ]; then + exit 0 +fi + +if [ ! "$NUAUTH_VERBOSITY" ]; then + NUAUTH_VERBOSITY="vv" +fi + +if [ ! "$NUAUTH_USER" ]; then + echo "No user configured to run nuauth... Trying \"nobody\" ..." + NUAUTH_USER="nobody" +fi + +DAEMON_OPTS="-D -$NUAUTH_VERBOSITY" + +set -e + +case "$1" in + start) + echo -n "Starting $DESC: " + start-stop-daemon --start --quiet --pidfile /var/run/$PID/$PID.pid \ + --chuid $NUAUTH_USER --exec $DAEMON -- $DAEMON_OPTS + echo "$NAME." + ;; + stop) + echo -n "Stopping $DESC: " + start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/$PID/$PID.pid \ + --retry 5 --exec $DAEMON + echo "$NAME." + ;; + #reload) + # + # If the daemon can reload its config files on the fly + # for example by sending it SIGHUP, do it here. + # + # If the daemon responds to changes in its config file + # directly anyway, make this a do-nothing entry. + # + # echo "Reloading $DESC configuration files." + # start-stop-daemon --stop --signal 1 --quiet --pidfile \ + # /var/run/$NAME.pid --exec $DAEMON + #;; + restart|force-reload) + # + # If the "reload" option is implemented, move the "force-reload" + # option to the "reload" entry above. If not, "force-reload" is + # just the same as "restart". + # + echo -n "Restarting $DESC: " + start-stop-daemon --stop --quiet --oknodo --pidfile \ + /var/run/$PID/$PID.pid --retry 5 --exec $DAEMON + sleep 1 + start-stop-daemon --start --quiet --pidfile /var/run/$PID/$PID.pid \ + --chuid $NUAUTH_USER --exec $DAEMON -- $DAEMON_OPTS + echo "$NAME." + ;; + *) + N=/etc/init.d/$NAME + # echo "Usage: $N {start|stop|restart|reload|force-reload}" >&2 + echo "Usage: $N {start|stop|restart|force-reload}" >&2 + exit 1 + ;; +esac + +exit 0 --- nufw-2.2.15.orig/debian/nuauth.default +++ nufw-2.2.15/debian/nuauth.default @@ -0,0 +1,10 @@ +#Change to "true" for Nufw to be started +NUAUTH_START="true" + +#Add "v"s so nufw gets more verbose +NUAUTH_VERBOSITY="vv" + +#User nuauth runs on. Change this to some entry existing in /etc/passwd +NUAUTH_USER="nuauth" + +#EDIT /etc/nuauth/nuauth.conf for other options! --- nufw-2.2.15.orig/debian/README.Debian +++ nufw-2.2.15/debian/README.Debian @@ -0,0 +1,14 @@ +nufw for Debian +--------------- + +nufw and nuauth packages provide a full-featured debconf interface, which +should prevent you from editing config files by hand. +However, nufw startup options can be found at /etc/default/nufw Nuauth startup +options at /etc/default/nuauth, config file at /etc/nuauth/nuauth.conf + +Bug : nuauth debconf interface asks for a user nuauth should run as ; if +specified user does not exist, debconf WILL fail. + + -- Vincent Deffontaines , Thu, 13 Nov 2003 13:03:54 +0100 + + WARNING - THESE DEBIAN PACKAGES ARE STILL EXPERIMENTAL --- nufw-2.2.15.orig/debian/pycompat +++ nufw-2.2.15/debian/pycompat @@ -0,0 +1 @@ +2 --- nufw-2.2.15.orig/debian/copyright +++ nufw-2.2.15/debian/copyright @@ -0,0 +1,29 @@ +This package was debianized by Vincent Deffontaines on +Thu, 13 Nov 2003 13:03:54 +0100. + +It was downloaded from http://www.nufw.org + +Upstream Authors: Eric Leblond + Vincent Deffontaines + +Copyright (C) 2007-2008 INL + +NuFW is licensed under the GPLv2 + + This package is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 dated June, 1991. + + This package is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this package; if not, write to the Free Software + Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, + MA 02110-1301, USA. + +On Debian GNU/Linux systems, the complete text of the GNU General +Public License can be found in `/usr/share/common-licenses/GPL'. + --- nufw-2.2.15.orig/debian/libnuclient3.install +++ nufw-2.2.15/debian/libnuclient3.install @@ -0,0 +1,2 @@ +src/clients/lib/.libs/libnuclient.so.3.0.0 usr/lib +src/clients/lib/.libs/libnuclient.so.3 usr/lib --- nufw-2.2.15.orig/debian/nuauth-log-mysql.dirs +++ nufw-2.2.15/debian/nuauth-log-mysql.dirs @@ -0,0 +1 @@ +usr/lib --- nufw-2.2.15.orig/debian/nuauth-log-mysql.docs +++ nufw-2.2.15/debian/nuauth-log-mysql.docs @@ -0,0 +1,3 @@ +conf/nulog.ipv4.mysql.dump +conf/nulog.ipv6.mysql.dump +conf/nulog-v1-v2.mysql.dump --- nufw-2.2.15.orig/debian/libpam-nufw.install +++ nufw-2.2.15/debian/libpam-nufw.install @@ -0,0 +1 @@ +src/clients/pam_nufw/.libs/pam_nufw.so lib/security --- nufw-2.2.15.orig/debian/nutcpc.dirs +++ nufw-2.2.15/debian/nutcpc.dirs @@ -0,0 +1 @@ +usr/bin --- nufw-2.2.15.orig/debian/nutcpc.docs +++ nufw-2.2.15/debian/nutcpc.docs @@ -0,0 +1,3 @@ +NEWS +README +TODO